Mon.Jul 18, 2022

article thumbnail

The Real-World Impact of Cyberattacks on Enterprises

Data Breach Today

IBM Security's Chris McCurdy Discusses Future Security Scenarios Cyberattacks aren't just an annoyance but have real-world effects. Case in point: ransomware attacks on Colonial Pipeline and on food processor JBS. IBM Security's Chris McCurdy discusses these developments and security scenarios emerging from the cyber-physical fusion.

article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

The 911 service as it exists today. For the past seven years, an online service known as 911 has sold access to hundreds of thousands of Microsoft Windows computers daily, allowing customers to route their Internet traffic through PCs in virtually any country or city around the globe — but predominantly in the United States. 911 says its network is made up entirely of users who voluntarily install its “free VPN” software.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proof of Concept: A New Era for Digital Identity?

Data Breach Today

Also: CISA's 18% Budget Increase; Software Bill of Materials Challenges Venable's Grant Schneider and Jeremy Grant and ISMG editors discuss progress at the U.S. federal level in developing legislation for digital identity, the significance of an 18% increase in funding for CISA in fiscal year 2023 and the challenges of expanding the use of software bills of materials.

259
259
article thumbnail

Trojanized Password Crackers Targeting Industrial Systems

Dark Reading

Tools purporting to help organizations recover lost passwords for PLCs are really droppers for malware targeting industrial control systems, vendor says.

Passwords 141
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hackers Steal $375K From Premint NFT Platform

Data Breach Today

Thieves Plant Malicious Code to Compromise Website, Trick Users Hackers used a vulnerability in an NFT collection platform to trick users into letting them drain their wallets. Thieves walked away with at least 314 NFTs worth about $375,000, an amount placing the incident among the year's largest NFT hacks. Some users also saw a Rickroll video.

245
245

More Trending

article thumbnail

FCC faces $3B Shortfall In Huawei Rip And Replace Program

Data Breach Today

A $2 billion fund to root out equipment from Chinese manufacturers Huawei and ZTE operating within small and rural U.S. telecoms isn't enough to cover costs, the Federal Communications Commission informed Congress. The program's full cost is closer to $5 billion, wrote FCC Chair Jessica Rosenworcel.

article thumbnail

Data Regulation Ramps Up in Europe: The AI, Data, and Data Governance Acts

Data Matters

Join Sidley and OneTrust DataGuidance for Part two of the “Data Regulation Ramps Up in Europe” webinar series, where our panel will discuss legislative proposals, including the Artificial Intelligence Act, the Data Act, and the Data Governance Act (DGA). In proposing these laws, the European Commission’s ambitious Digital and Data Strategy aims to address the legal, ethical, and technological complexities of AI, as well as the use of personal and non-personal data across the economy

article thumbnail

Thales Buys OneWelcome for $101.6M to Enter CIAM Market

Data Breach Today

Thales Plans to Extend OneWelcome Beyond Europe and into North America and Asia Thales plans to enter the customer identity and access management market through its purchase of an emerging European CIAM player. The French firm plans to capitalize on OneWelcome's strong product by extending its footprint beyond Europe and into North America and Asia-Pacific.

Marketing 240
article thumbnail

Retbleed Fixed in Linux Kernel, Patch Delayed

Dark Reading

Linus Torvalds says Retbleed has been addressed in the Linux kernel, but code complexity means the release will be delayed by a week to give more time for testing.

112
112
article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Assessing the Privacy, Security Risks of Digital Health IT

Data Breach Today

A new assessment framework aims to help patients, healthcare providers and others examine the various privacy, security and other risks of digital health technologies, says Tim Andrews of the nonprofit Organization for the Review of Care and Health Applications, which co-developed the framework.

Risk 240
article thumbnail

Phishing Kit Imitates PayPal

KnowBe4

Researchers at Akamai have discovered a PayPal phishing kit that attempts to steal victims’ identities as well as their financial information. The phishing page looks identical to Paypal’s login page, and asks users to solve a captcha before entering their username and password. The researchers note that asking for the captcha can instill a sense of trust in the user, since they feel like the site is asking for security measures.

article thumbnail

WordPress Page Builder Plug-in Under Attack, Can't Be Patched

Dark Reading

An ongoing campaign is actively targeting the vulnerability in the Kaswara Modern WPBakery Page Builder Addon, which is still installed on up to 8,000 sites, security analysts warn.

article thumbnail

MLNK Builder 4.2 released in Dark Web – malicious shortcut-based attacks are on the rise

Security Affairs

Cybercriminals released a new MLNK Builder 4.2 tool for malicious shortcuts (LNK) generation with an improved Powershell and VBS Obfuscator. Resecurity, Inc. (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 worldwide, has detected an update of one of the most popular tools used by cybercriminals to generate malicious LNK files, so frequently used for malicious payloads delivery nowadays.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Building Guardrails for Autonomic Security

Dark Reading

AI's potential for automating security has promise, but there are miles to go in establishing decision-making boundaries.

article thumbnail

Tor Browser 11.5 is optimized to automatically bypass censorship

Security Affairs

The Tor Project team has announced the release of Tor Browser 11.5, which introduces functionalities to automatically bypass censorship. The Tor Project team has announced the release of Tor Browser 11.5 , the new version of the popular privacy-oriented browser implements new features to fight censorship. With previous versions of the browser, circumventing censorship of the Tor Network itself was a manual process that required users to dive into Tor Network settings and chose a bridge to unbloc

Privacy 84
article thumbnail

Watch Out for User Impersonation in Low-Code/No-Code Apps

Dark Reading

How a well-meaning employee could unwittingly share their identity with other users, causing a whole range of problems across IT, security, and the business.

article thumbnail

Google Boots Multiple Malware-laced Android Apps from Marketplace

Threatpost

Google removed eight Android apps, with 3M cumulative downloads, from its marketplace for being infected with a Joker spyware variant.

IT 91
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Name That Toon: Modern-Day Fable

Dark Reading

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

99
article thumbnail

NIST Announced Four Quantum-Resistant Cryptographic Algorithms

Thales Cloud Protection & Licensing

NIST Announced Four Quantum-Resistant Cryptographic Algorithms. divya. Mon, 07/18/2022 - 13:10. The National Institute of Standards and Technology (NIST) has selected the first collection of encryption tools designed to withstand the assault of a future quantum computer, which might compromise the security employed to preserve privacy in the digital systems we rely on.

article thumbnail

The IGP Exam: New and Improved

ARMA International

As the world’s leading membership organization serving professionals who manage and govern information, ARMA is pleased to announce the release of its updated Information Governance Professional (IGP) Certification Exam. As of July 15 th , 2022, professionals in information governance, information management, as well as information security, technology, and privacy have access to the new and improved IGP Certification Exam. .

article thumbnail

Today’s RFID Tags Reach Deep Into Many Industries

HID Global

Today’s RFID Tags Reach Deep Into Many Industries. niandolo. Mon, 07/18/2022 - 09:11.

98
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

FBI: Beware of Scam Cryptocurrency Investment Apps

Dark Reading

Law enforcement estimates campaign has already bilked cryptocurrency investors out of $42.7 million.

86
article thumbnail

CISA Urges Patch of Exploited Windows 11 Bug by Aug. 2

Threatpost

Feds urge U.S. agencies to patch a Microsoft July Patch Tuesday 2022 bug that is being exploited in the wild by August 2.

75
article thumbnail

Ransomware Attempts Flag as Payments Also Decline

Dark Reading

Telecom and business services see the highest level of attacks, but the two most common ransomware families, which continue to be LockBit and Conti, are seen less often.

article thumbnail

Collibra #44 on Best Workplaces for Millennials!

Collibra

At Collibra, we’re on a mission to change the way that organizations use data so our customers can change the world. It’s ambitious and so are we. Inclusive by design, we’re a one-of-a-kind team spanning countries, backgrounds and perspectives. Together, we build from a foundation of respect and belonging. We are incredibly honored and excited to share that Great Place to Work and Fortune magazine have included Collibra as one of this year’s Best Workplaces for Millennials !

IT 52
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Work how you work best at Jamf

Jamf

At Jamf, we’re empowered to work how we work best… and no matter where we’re signing in from, we have the best tech for the job. Want to work from home? Pick your Apple technology package, and count on seamless connection to all the resources you need. Heading into the office? Our new employee ID in Apple Wallet makes coming and going easier than ever; your iPhone or Apple Watch is now your employee ID!

52
article thumbnail

How Better Product Usability Could Increase Ridership in Public Transit

HID Global

How Better Product Usability Could Increase Ridership in Public Transit. atay. Mon, 07/18/2022 - 09:19.

52
article thumbnail

Jamf After Dark: Everything You Need to Know about JNUC 2022

Jamf

Listen to event specialists Jeff Ovik and Anna Hedstrom invoke the ghosts of JNUCs past and explain what this year’s hybrid conference in San Diego holds in store.

52